Basic HTML version of Foils prepared April 7 1998

Foil 37 Authentication with public key Cryptography

From Basic Principles of Java and Internet Security CPS616 Web Technologies -- Spring 98. by Geoffrey C. Fox


Here A chooses a challenge -- a random number r and can verify that B is at other end using solely public information!
Alice is A
Bob is B



© Northeast Parallel Architectures Center, Syracuse University, npac@npac.syr.edu

If you have any comments about this server, send e-mail to webmaster@npac.syr.edu.

Page produced by wwwfoil on Sun Nov 29 1998